Question
a.
Hping
b.
NMAP
c.
Google Dorks
d.
Nexpose
Posted under Cyber Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Which of the following is not a reconnaissance tool or technique for information gathering?
Similar Questions
Discover Related MCQs
Q. There are ______ subtypes of reconnaissance.
View solution
Q. Which of the following is an example of active reconnaissance?
View solution
Q. Which of the following is an example of passive reconnaissance?
View solution
Q. ________ phase in ethical hacking is known as the pre-attack phase.
View solution
Q. While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ethical hacking.
View solution
Q. Which of them does not comes under scanning methodologies?
View solution
Q. Which of them is not a scanning tool?
View solution
Q. Which of the following comes after scanning phase in ethical hacking?
View solution
Q. In __________ phase the hacker exploits the network or system vulnerabilities.
View solution
Q. Which of the following is not done in gaining access phase?
View solution
Q. Which of the below-mentioned penetration testing tool is popularly used in gaining access phase?
View solution
Q. A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase.
View solution
Q. In which phase, the hackers install backdoors so that his/her ownership with the victim’s system can be retained later?
View solution
Q. _______ is the tool used for this purpose.
View solution
Q. Which of the following hacking tools and techniques hackers’ do not use for maintaining access in a system?
View solution
Q. In _______ phase, the hackers try to hide their footprints.
View solution
Q. Which of them is not a track clearing technique?
View solution
Q. __________ is the last phase of ethical hacking process.
View solution
Q. Which of the following is not a footprint-scanning tool?
View solution
Q. ___________ is a special form of attack using which hackers’ exploit – human psychology.
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cyber Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!